In addition to the VPN services discussed previously, there is a collection of technology components, both hardware and software, emerging to provide greater privacy over unsecured and public networks. These technologies primarily apply to IP-based networks but in some cases have extended to Apple Computer networks (based on AppleTalk communications protocols), Novell's Internet packet Exchange protocols (IPX) and Network Basic Input/output System (NetBIOS) Extended User interface (NetBEUI). Virtual Private Networking technologies are implemented at the network level and typically provide tunneling, encryption, security key exchange and authentication services. Before proceeding it is important to have a good understanding of what these technologies provide.
In addition to the VPN services discussed previously, there is a collection of technology components, both hardware and software, emerging to provide greater privacy over unsecured and public networks. These technologies primarily apply to IP-based networks but in some cases have extended to Apple Computer networks (based on AppleTalk communications protocols), Novell's Internet packet Exchange protocols (IPX) and Network Basic Input/output System (NetBIOS) Extended User interface (NetBEUI). Virtual Private Networking technologies are implemented at the network level and typically provide tunneling, encryption, security key exchange and authentication services. Before proceeding it is important to have a good understanding of what these technologies provide.
Back